Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
efb9c9f354536594884ea77e33cd7e68_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efb9c9f354536594884ea77e33cd7e68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efb9c9f354536594884ea77e33cd7e68_JaffaCakes118.html
-
Size
769B
-
MD5
efb9c9f354536594884ea77e33cd7e68
-
SHA1
b3e84312fdf5dbb5e665f7f32313e60b486e7d4e
-
SHA256
3c69c3c5a4c18ecd958fad902e657e012964e18764165b6b06c84c8e9daf9232
-
SHA512
63b58457a6d897cd6fb05d8aa4fcfe543cda10014277cd3e2826bce1694e36d1a8d585e9e3cdaaf005985f8655793e168893d1a487f1724bcb9d308b46185275
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c082d41f1c0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B6A2421-780F-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433081152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009bbf8aa178d007aedaad661a290f07cb56ae87fb902e9681238052d98ca7ae0c000000000e8000000002000020000000cc521286e08bfa33d338468b9b99eecf0c41922de4710db012d1c6bce7f8dd8f200000000dad966815641bf6dc2cb0dc14f7ac99c40f948f4679f540d9e0ad4ccab49da540000000f4694e8815627d0fd353aa6b132743b1cc980702c3d18787db6d4e79c996ffef91c760a68f558459c3198165cbda587e52152c81a39029e2fb5010647f513ed9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3052 2108 iexplore.exe 30 PID 2108 wrote to memory of 3052 2108 iexplore.exe 30 PID 2108 wrote to memory of 3052 2108 iexplore.exe 30 PID 2108 wrote to memory of 3052 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efb9c9f354536594884ea77e33cd7e68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f73b40ec53c76518924f06fc6a1e093
SHA162ac7494cbd5a7906c0c1493bde9818268aaf6a9
SHA256ad7b0b95fd9a4fecadfa448319dd0dc829466cb7b432d78ca20d13a9874c7154
SHA512f6d943461dcf68db7dc7ca95c741ba512fe03d08876b00b8427d0b970e2f6b981c4664752c0d3671915713dd22b33ff8b494589d3ecd6f9181757da2ef698f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8e32cc4f0dc8c809a26af56beebeee
SHA1d295a38cef69ca17f7950e197720e0c0c65c93f4
SHA25648055a8281765e5ce81faa4130b59f268cd53b9bcc0156063732f29f6de42488
SHA51202a5e8d18d5b4351e213620a43117823b7446e5d499c90681cdf60a0f728ca53a536bf7ed04afcb372b91afda137d0b14228c0afbb8428ee2ac3a4f3b4498d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9cb816e727131541a7391cb545ff51
SHA1043523b718e2d933764316ab0ed64a5fc1d1d7e0
SHA256e22bbb6493071827fcb6df56f62707b66beb29872bc79b079d6dc602eff82570
SHA512c0daff988367a95561c112d55c15b2819b3eabf49a9abdc4f4b390884c2d015be9967038cddf80f9b25da0c57a04b7747c9b80ce835872360fd45e6562372fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e60ba7dd5fbd1ae6818b41c89ea9eb5
SHA128d7172281aaffc962be8ecc670c8fdcbbb4f2f7
SHA256323ce35e27e734c21572226ba5cf36ef11c1610bc9625e1ba640f6640e67d524
SHA51298959639341ac2ea2332f68efc187a3c24c7e36ea56db96bf364fa22a0b8899c8abced4ecd8a8ccb0c2d52825adb6fc618eeeade1b8d30455bb7202ed8afb91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1579b0c6aef05eb62c308b73091422
SHA1321a9148880db0cd8dd290f62feb663348059936
SHA2566a306326b2224b363a9f4a7baf196330e1311b58ea4c89fc7436c101ddee9cf1
SHA512286e9ea7188b93e7e90c77b2547d1c462eab0d75322c9c957545d0e6d2429672b53acaa95cccad3908411d3e2579ed4f5cc6c4533921cef27693efa50d8153a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2eaea01f45bf62d7e9554d15363c9e
SHA1e9ea5abdec2b8e0086c82a49fd57cc2b68ee1ffe
SHA256a90590a237d188bbab4aae34bf678f0f57e8d4c0d845999a8385c203795f5152
SHA512c50e2e7997692acace92414a7bc0d23398ef7b254069c681512d1e53fc68be4c2e25129f3467d68127e9d3e31d5778de42566970b9e617b29911eef04b35f184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59255cb2a182b8e74c474be80b5a179e0
SHA1a3aaad4a38d9984a8839b16469a421797f060b7c
SHA256b1b5412863d8d481d9ba0124bd8fa5d27a0c3004969a985659345fd0c57caf10
SHA5122d906f33fc8385dcd52e2a67a63140bb69ff06223a3e7a544044b21181ad7c9dd7cf4b62e441c0e91a76563fb4f8d171481e90409cf3cae26d7330696eb02bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295a201a5943843ec8be78f6a15c7bd3
SHA15b292efc728421ca51d6775fdf3c8187e1f7a0e0
SHA2566d05d519e01671d5c560124e7a3ca20088755e4c4c1e1ca17f3b396a8d5dbe44
SHA512661c30ffc4f9b22b238659fcbb7d031957e9eda9231912629e7ab3b7024d84edf3a871c64dfb2ec7bd149cfd5ab360ac8ebb3e26128f9baf4bd0b4170464871c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68a233ad0f186c521f01a825e707316
SHA126263f622db0cd6b85a625ba49a163a03fa28894
SHA2565c9b2cd34fd1e7c752b4d46c8a3987dfb886e6443aff966f0b81a9d4f4ec7fce
SHA5123bf312462333a86f0a1ab6cdb9f1cae784e4526a616241b5d46522bfaa0ecae32a9f18c05776029b1f5aeba7e5161e7e60e3a16a75ad7b8e258080397abe4dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c95ec24c60c7d65d319fb5a763dc07
SHA1cba53896f8f7fd9e1c4bbfeeb2a1382b08e4cb9f
SHA256febe7555c1065e7422ee4f534690ce95edc1403ce5619af72b2d3c9211c8d46f
SHA512bca46697652c70bcf87ff2c4a0bf86d55a63dd36c481b315b18f30c127a83188fb68bdf1050c5149a139bfe61e3732d60495a3229b55ff113ab741a004a0bafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd0e6222999e5d118ac98aad9385a63
SHA11ec6454cbb8a4500a968c0aeb4a36b40136b26af
SHA256b88acc1e1fe4e6f0de7c8c859ed0e2177d0723d8613681cfd6a5c4156d2f8deb
SHA51259c6f7065d9858be99e741fd07beaf694da4be48c9f8dd68d40fa252000f181c2d71198051c9c872a6eb791109a7b277598af345ecb0e7ff3bb66e26c08de169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa17abf12ef22698a0dc27b3e1081f51
SHA1dfcb1280f8d649cc92f539b7cfe19a3ce79050b5
SHA2560ccaa7058e5a451fb860d5a344e99a7d868113eb3cbc67895e9aa24ede41c347
SHA51284ab91454b9657a7b5a7f8e0456e912d7beb60daaac27fc5faa97991d14e072a12a46d581dc6cb9025a15868858892c8de880b3b2efa2c4763d2adf66ded70ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3da3b7edca2b0073278b65d7a2053b
SHA1400257fd963b659c84ea15299823e1a5e215d582
SHA2560c6e9e7fdd2f875dae771ea33d745e9337b73cd4e50eae100e4c51609b82b79f
SHA512e7d84acd54cb317297307a9e1a9e3e0113c3d399e37f0fd924f838e0334686d82edacb9f2d366e57d5c2840f04f8c992d0f2987e746563c80d24616f4089d6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d4c8aac69ebdf7db33bb60a25013eb
SHA153cc253fc81c24e872d927cb1571e8a081af52c6
SHA256f3be87e4f0d9f636d0b552315fdbb8c57cd46229623e5302757aa27091de179c
SHA51207c8fd218262c118fce8dab8648864b46c986bd9155028a5a4b6654ecfa6dcd06e556e9e0bbb1ec75499473ba03817e0b287bc9d9ec3fed4dabaf00e367a41a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d701d691187f33d0f423ccf404ab33
SHA15da6500f9dd1e0594084c072987d0895acd8d3fa
SHA25696325bcf926a85a0fa0bf260938bc6eb6009710d7df57a9c46f206878ecf1326
SHA51299a86dfbbdc4d93e717950a709a5c4e0e1bee7f9fc283186d71c40ff1de84007b224859f7c3ca62e0b2fef0538b62ac81e358934fc08a30be6ea842acc027644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad032edd5f227062356aca1015a29e58
SHA1f253433ced0a1e9eadc1f6c1e703e59658e3b683
SHA256b66213784803ef7e18b806ef760f6632f378713a927c484ece2804339c310032
SHA51248a4140d7ab974a90aaba737f77ff5d8605173b04649aa2308ed369db0bd0de7ca4330fb61110ab258629f30c0ab5291457f771490381f2d179f8d8c5c5741c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6c87905f4e3e137f03024ed9e56b57
SHA184faf6e4c8c72610d47ca2ed8208c7853acb8af7
SHA25659b11f340a3b7d2b6bbb5d9570ab5bad99b3c03c287143303b5f4200d56838b1
SHA512c6f7d1206800d86f945ff20db59e12a0111cd54956d4acc92cbc729de15c4fafd3c0dbf7aa679012ebb2f90e1dad34a4e4a1f6ecc4f26db29fea060877902ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b682c54d7d14ed4b1b68d02038c3b95
SHA1d572ae2c40962758422fcae119132f5bb30c577a
SHA256f6613c61852cd5234e5af0bba3db64f75c71b20640436098602d76b094ac7879
SHA512eab18e84dc5e90f7fff27335bf2274401e24b454f15836d6b603b3de16dd067f0d2ed80e1fe6af9b47d3ecfccf89ad2d0515fb2cdd5e80c6c588f41c91ef07ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec07e20d96c77dfcb7f4529ffbdcab0
SHA102a636945c15a0f3b8cb299059dc23dcdccfe6a3
SHA2564dfb38d4e3445b9a38529018168d5adf5fd04a2d9e3196663aea24c65eec38e6
SHA5123b29a79cea25672eb42fbd205375b3fc4616ee29b9fe39fddb8cb2fe177cc332f2afafd54318812a0f0243d9bf7c538b014cbdf7a0d4c6322e71bb835702ade1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b